It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

It establishes a phone connection with a high rate number.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It spreads , across the Internet.

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

It allows to gain remote access to the affected computer.It opens one or more ports to allow remote access to the computer.It uses stealth techniques to avoid being detected by the user.It does not spread automatically using its own means.

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

It allows to gain remote access to the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.

Apache CloudStack 4.5.x before 4.5.2.1, 4.6.x before 4.6.2.1, 4.7.x before 4.7.1.1, and 4.8.x before 4.8.0.1, when SAML-based authentication is enabled and used, allow remote attackers to bypass authentication and access the user interface via vectors related to the SAML plugin.